Masud Moshtaghi
University of Melbourne
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Masud Moshtaghi.
Pattern Recognition | 2011
Masud Moshtaghi; Timothy C. Havens; James C. Bezdek; Laurence Anthony F. Park; Christopher Leckie; Sutharshan Rajasegarar; James M. Keller; Marimuthu Palaniswami
Comparing, clustering and merging ellipsoids are problems that arise in various applications, e.g., anomaly detection in wireless sensor networks and motif-based patterned fabrics. We develop a theory underlying three measures of similarity that can be used to find groups of similar ellipsoids in p-space. Clusters of ellipsoids are suggested by dark blocks along the diagonal of a reordered dissimilarity image (RDI). The RDI is built with the recursive iVAT algorithm using any of the three (dis) similarity measures as input and performs two functions: (i) it is used to visually assess and estimate the number of possible clusters in the data; and (ii) it offers a means for comparing the three similarity measures. Finally, we apply the single linkage and CLODD clustering algorithms to three two-dimensional data sets using each of the three dissimilarity matrices as input. Two data sets are synthetic, and the third is a set of real WSN data that has one known second order node anomaly. We conclude that focal distance is the best measure of elliptical similarity, iVAT images are a reliable basis for estimating cluster structures in sets of ellipsoids, and single linkage can successfully extract the indicated clusters.
international conference on intelligent sensors, sensor networks and information processing | 2009
Masud Moshtaghi; Sutharshan Rajasegarar; Christopher Leckie; Shanika Karunasekera
A major challenge for the management of low-cost sensor networks is how to ensure the integrity of the data collected, and how to detect unusual events. In this paper, we present a distributed algorithm for anomaly detection in wireless sensor networks, which reduces the amount of data that needs to be communicated through the network. Our approach learns an ellipsoidal boundary for normal data at each sensor, and introduces a method to cluster these ellipsoids at a global level in order to model normal behaviour in the network. We demonstrate that our approach can achieve greater accuracy in non-homogeneous sensing environments than existing methods, while achieving low communication and computational overhead in the network.
IEEE Computational Intelligence Magazine | 2011
James C. Bezdek; Sutharshan Rajasegarar; Masud Moshtaghi; Christopher Leckie; Marimuthu Palaniswami; Timothy C. Havens
We apply a recently developed model for anomaly detection to sensor data collected from a single node in the Heron Island wireless sensor network, which in turn is part of the Great Barrier Reef Ocean Observation System. The collection period spanned six hours each day from February 21 to March 22, 2009. Cyclone Hamish occurred on March 9, 2009, roughly in the middle of the collection period. Our system converts sensor measurements to elliptical summaries. Then a dissimilarity image of the data is built from a measure of focal distance between pairs of ellipses. Dark blocks along the diagonal of the image suggest clusters of ellipses. Finally, the single linkage algorithm extracts clusters from the dissimilarity data. We illustrate the model with three two-dimensional subsets of the three dimensional measurements of (air) pressure, temperature and humidity. Our examples show that iVAT images of focal distance are a reliable basis for estimating cluster structures in sets of ellipses, and that single linkage can successfully extract the indicated clusters. In particular, we are able to clearly isolate the cyclone Hamish event with this method, which demonstrates the ability of our model to detect anomalies in environmental monitoring networks.
international conference on data mining | 2011
Masud Moshtaghi; Christopher Leckie; Shanika Karunasekera; James C. Bezdek; Sutharshan Rajasegarar; Marimuthu Palaniswami
Wireless Sensor Networks (WSNs) provide a low cost option for gathering spatially dense data from different environments. However, WSNs have limited energy resources that hinder the dissemination of the raw data over the network to a central location. This has stimulated research into efficient data mining approaches, which can exploit the restricted computational capabilities of the sensors to model their normal behavior. Having a normal model of the network, sensors can then forward anomalous measurements to the base station. Most of the current data modeling approaches proposed for WSNs require a fixed offline training period and use batch training in contrast to the real streaming nature of data in these networks. In addition they usually work in stationary environments. In this paper we present an efficient online model construction algorithm that captures the normal behavior of the system. Our model is capable of tracking changes in the data distribution in the monitored environment. We illustrate the proposed algorithm with numerical results on both real-life and simulated data sets, which demonstrate the efficiency and accuracy of our approach compared to existing methods.
Pattern Recognition | 2011
Masud Moshtaghi; Sutharshan Rajasegarar; Christopher Leckie; Shanika Karunasekera
Clustering has been widely used as a fundamental data mining tool for the automated analysis of complex datasets. There has been a growing need for the use of clustering algorithms in embedded systems with restricted computational capabilities, such as wireless sensor nodes, in order to support automated knowledge extraction from such systems. Although there has been considerable research on clustering algorithms, many of the proposed methods are computationally expensive. We propose a robust clustering algorithm with low computational complexity, suitable for computationally constrained environments. Our evaluation using both synthetic and real-life datasets demonstrates lower computational complexity and comparable accuracy of our approach compared to a range of existing methods.
Pattern Recognition | 2014
Sutharshan Rajasegarar; Alexander Gluhak; Muhammad Imran; Michele Nati; Masud Moshtaghi; Christopher Leckie; Marimuthu Palaniswami
Anomaly detection in resource constrained wireless networks is an important challenge for tasks such as intrusion detection, quality assurance and event monitoring applications. The challenge is to detect these interesting events or anomalies in a timely manner, while minimising energy consumption in the network. We propose a distributed anomaly detection architecture, which uses multiple hyperellipsoidal clusters to model the data at each sensor node, and identify global and local anomalies in the network. In particular, a novel anomaly scoring method is proposed to provide a score for each hyperellipsoidal model, based on how remote the ellipsoid is relative to their neighbours. We demonstrate using several synthetic and real datasets that our proposed scheme achieves a higher detection performance with a significant reduction in communication overhead in the network compared to centralised and existing schemes.
IEEE Transactions on Fuzzy Systems | 2015
Masud Moshtaghi; James C. Bezdek; Christopher Leckie; Shanika Karunasekera; Marimuthu Palaniswami
Evolvable Takagi-Sugeno (T-S) models are fuzzy-rule-based models with the ability to continuously learn and adapt to incoming samples from data streams. The model adjusts both premise and consequent parameters to enhance the performance of the model. This paper introduces a new methodology for the estimation of the premise parameters in the evolvable T-S (eTS) model. Incremental updates for the weighted sample mean and inverse of the covariance matrix enable us to construct an evolvable fuzzy rule base that is used to detect outliers and regime changes in the input stream. We compare our model with Angelovs eTS+ model with artificial and real data.
pacific-asia conference on knowledge discovery and data mining | 2014
Mahsa Salehi; Christopher Leckie; Masud Moshtaghi; Tharshan Vaithianathan
Anomaly detection in data streams plays a vital role in on-line data mining applications. A major challenge for anomaly detection is the dynamically changing nature of many monitoring environments. This causes a problem for traditional anomaly detection techniques in data streams, which assume a relatively static monitoring environment. In an environment that is intermittently changing (known as switching data streams), static approaches can yield a high error rate in terms of false positives. To cope with dynamic environments, we require an approach that can learn from the history of normal behaviour in data streams, while accounting for the fact that not all time periods in the past are equally relevant. Consequently, we have proposed a relevance-weighted ensemble model for learning normal behaviour, which forms the basis of our anomaly detection scheme. The advantage of this approach is that it can improve the accuracy of detection by using relevant history, while remaining computationally efficient. Our solution provides a novel contribution through the use of ensemble techniques for anomaly detection in switching data streams. Our empirical results on real and synthetic data streams show that we can achieve substantial improvements compared to a recent anomaly detection algorithm for data streams.
Archive | 2012
Yang Liao; Masud Moshtaghi; Bo Han; Shanika Karunasekera; Ramamohanarao Kotagiri; Timothy Baldwin; Aaron Harwood; Philippa Pattison
This chapter investigates whether and how micro-messaging technologies such as Twitter messages can be harnessed to obtain valuable information. The interesting characteristics of micro-blogging services, such as being user oriented, provide opportunities for different applications to use the content of these sites to their advantage. However, the same characteristics become the weakness of these sites when it comes to data modelling and analysis of the messages. These sites contains very large amount of unstructured, noisy with false or missing data which make the task of data mining difficult. This chapter first reviews some of the potential applications of the micro-messaging services and then provides some insight into different challenges faced by data mining applications. Later in this chapter, characteristics of a real data collected from the Twitter are analysed. At the end of chapter, application of micro-blogging services is shown by three different case studies.
Computer Networks | 2014
Masud Moshtaghi; Christopher Leckie; Shanika Karunasekera; Sutharshan Rajasegarar
Wireless Sensor Networks (WSNs) provide a low cost option for monitoring different environments such as farms, forests and water and electricity networks. However, the restricted energy resources of the network impede the collection of raw monitoring data from all the nodes to a single location for analysis. This has stimulated research into efficient anomaly detection techniques to extract information about unusual events such as malicious attacks or faulty sensors at each node. Many previous anomaly detection methods have relied on centralized processing of measurement data, which is highly communication intensive. In this paper, we present an efficient algorithm to detect anomalies in a decentralized manner. In particular, we propose a novel adaptive model for anomaly detection, as well as a robust method for modeling normal behavior. Our evaluation results on both real-life and simulated data sets demonstrate the accuracy of our approach compared to existing methods.